All product names, logos, and brands are property of their respective owners. All company, product and service names used in this website are for identification purposes only. Use of these names, logos, and brands does not imply endorsement.If you are an owner of some content and want it to be removed, please mail to content@vulners.com Vulners, 2017

{"result": {"cve": [{"id": "CVE-2012-1586", "type": "cve", "title": "CVE-2012-1586", "description": "mount.cifs in cifs-utils 2.6 allows local users to determine the existence of arbitrary files or directories via the file path in the second argument, which reveals their existence in an error message.", "published": "2012-08-27T19:55:01", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1586", "cvelist": ["CVE-2012-1586"], "lastseen": "2016-09-03T16:25:19"}], "nessus": [{"id": "SUSE_11_CIFS-UTILS-120423.NASL", "type": "nessus", "title": "SuSE 11.2 Security Update : cifs-utils (SAT Patch Number 6196)", "description": "The following issue has been fixed :\n\n - Don't allow unprivileged users to mount onto dirs to which they can't chdir. (CVE-2012-1586)", "published": "2012-05-01T00:00:00", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=58942", "cvelist": ["CVE-2012-1586"], "lastseen": "2017-10-29T13:46:08"}, {"id": "ORACLELINUX_ELSA-2012-0902.NASL", "type": "nessus", "title": "Oracle Linux 6 : cifs-utils (ELSA-2012-0902)", "description": "From Red Hat Security Advisory 2012:0902 :\n\nAn updated cifs-utils package that fixes one security issue, multiple bugs, and adds various enhancements is now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.\n\nThe cifs-utils package contains tools for mounting and managing shares on Linux using the SMB/CIFS protocol. The CIFS shares can be used as standard Linux file systems.\n\nA file existence disclosure flaw was found in mount.cifs. If the tool was installed with the setuid bit set, a local attacker could use this flaw to determine the existence of files or directories in directories not accessible to the attacker. (CVE-2012-1586)\n\nNote: mount.cifs from the cifs-utils package distributed by Red Hat does not have the setuid bit set. We recommend that administrators do not manually set the setuid bit for mount.cifs.\n\nThis update also fixes the following bugs :\n\n* The cifs.mount(8) manual page was previously missing documentation for several mount options. With this update, the missing entries have been added to the manual page. (BZ#769923)\n\n* Previously, the mount.cifs utility did not properly update the '/etc/mtab' system information file when remounting an existing CIFS mount. Consequently, mount.cifs created a duplicate entry of the existing mount entry. This update adds the del_mtab() function to cifs.mount, which ensures that the old mount entry is removed from '/etc/mtab' before adding the updated mount entry. (BZ#770004)\n\n* The mount.cifs utility did not properly convert user and group names to numeric UIDs and GIDs. Therefore, when the 'uid', 'gid' or 'cruid' mount options were specified with user or group names, CIFS shares were mounted with default values. This caused shares to be inaccessible to the intended users because UID and GID is set to '0' by default. With this update, user and group names are properly converted so that CIFS shares are now mounted with specified user and group ownership as expected. (BZ#796463)\n\n* The cifs.upcall utility did not respect the 'domain_realm' section in the 'krb5.conf' file and worked only with the default domain.\nConsequently, an attempt to mount a CIFS share from a different than the default domain failed with the following error message :\n\nmount error(126): Required key not available\n\nThis update modifies the underlying code so that cifs.upcall handles multiple Kerberos domains correctly and CIFS shares can now be mounted as expected in a multi-domain environment. (BZ#805490)\n\nIn addition, this update adds the following enhancements :\n\n* The cifs.upcall utility previously always used the '/etc/krb5.conf' file regardless of whether the user had specified a custom Kerberos configuration file. This update adds the '--krb5conf' option to cifs.upcall allowing the administrator to specify an alternate krb5.conf file. For more information on this option, refer to the cifs.upcall(8) manual page. (BZ#748756)\n\n* The cifs.upcall utility did not optimally determine the correct service principal name (SPN) used for Kerberos authentication, which occasionally caused krb5 authentication to fail when mounting a server's unqualified domain name. This update improves cifs.upcall so that the method used to determine the SPN is now more versatile.\n(BZ#748757)\n\n* This update adds the 'backupuid' and 'backupgid' mount options to the mount.cifs utility. When specified, these options grant a user or a group the right to access files with the backup intent. For more information on these options, refer to the mount.cifs(8) manual page.\n(BZ#806337)\n\nAll users of cifs-utils are advised to upgrade to this updated package, which contains backported patches to fix these issues and add these enhancements.", "published": "2013-07-12T00:00:00", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=68560", "cvelist": ["CVE-2012-1586"], "lastseen": "2017-10-29T13:43:08"}, {"id": "REDHAT-RHSA-2012-0902.NASL", "type": "nessus", "title": "RHEL 6 : cifs-utils (RHSA-2012:0902)", "description": "An updated cifs-utils package that fixes one security issue, multiple bugs, and adds various enhancements is now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.\n\nThe cifs-utils package contains tools for mounting and managing shares on Linux using the SMB/CIFS protocol. The CIFS shares can be used as standard Linux file systems.\n\nA file existence disclosure flaw was found in mount.cifs. If the tool was installed with the setuid bit set, a local attacker could use this flaw to determine the existence of files or directories in directories not accessible to the attacker. (CVE-2012-1586)\n\nNote: mount.cifs from the cifs-utils package distributed by Red Hat does not have the setuid bit set. We recommend that administrators do not manually set the setuid bit for mount.cifs.\n\nThis update also fixes the following bugs :\n\n* The cifs.mount(8) manual page was previously missing documentation for several mount options. With this update, the missing entries have been added to the manual page. (BZ#769923)\n\n* Previously, the mount.cifs utility did not properly update the '/etc/mtab' system information file when remounting an existing CIFS mount. Consequently, mount.cifs created a duplicate entry of the existing mount entry. This update adds the del_mtab() function to cifs.mount, which ensures that the old mount entry is removed from '/etc/mtab' before adding the updated mount entry. (BZ#770004)\n\n* The mount.cifs utility did not properly convert user and group names to numeric UIDs and GIDs. Therefore, when the 'uid', 'gid' or 'cruid' mount options were specified with user or group names, CIFS shares were mounted with default values. This caused shares to be inaccessible to the intended users because UID and GID is set to '0' by default. With this update, user and group names are properly converted so that CIFS shares are now mounted with specified user and group ownership as expected. (BZ#796463)\n\n* The cifs.upcall utility did not respect the 'domain_realm' section in the 'krb5.conf' file and worked only with the default domain.\nConsequently, an attempt to mount a CIFS share from a different than the default domain failed with the following error message :\n\nmount error(126): Required key not available\n\nThis update modifies the underlying code so that cifs.upcall handles multiple Kerberos domains correctly and CIFS shares can now be mounted as expected in a multi-domain environment. (BZ#805490)\n\nIn addition, this update adds the following enhancements :\n\n* The cifs.upcall utility previously always used the '/etc/krb5.conf' file regardless of whether the user had specified a custom Kerberos configuration file. This update adds the '--krb5conf' option to cifs.upcall allowing the administrator to specify an alternate krb5.conf file. For more information on this option, refer to the cifs.upcall(8) manual page. (BZ#748756)\n\n* The cifs.upcall utility did not optimally determine the correct service principal name (SPN) used for Kerberos authentication, which occasionally caused krb5 authentication to fail when mounting a server's unqualified domain name. This update improves cifs.upcall so that the method used to determine the SPN is now more versatile.\n(BZ#748757)\n\n* This update adds the 'backupuid' and 'backupgid' mount options to the mount.cifs utility. When specified, these options grant a user or a group the right to access files with the backup intent. For more information on these options, refer to the mount.cifs(8) manual page.\n(BZ#806337)\n\nAll users of cifs-utils are advised to upgrade to this updated package, which contains backported patches to fix these issues and add these enhancements.", "published": "2012-06-20T00:00:00", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=59596", "cvelist": ["CVE-2012-1586"], "lastseen": "2017-10-29T13:43:16"}, {"id": "SL_20120620_CIFS_UTILS_ON_SL6_X.NASL", "type": "nessus", "title": "Scientific Linux Security Update : cifs-utils on SL6.x i386/x86_64", "description": "The cifs-utils package contains tools for mounting and managing shares on Linux using the SMB/CIFS protocol. The CIFS shares can be used as standard Linux file systems.\n\nA file existence disclosure flaw was found in mount.cifs. If the tool was installed with the setuid bit set, a local attacker could use this flaw to determine the existence of files or directories in directories not accessible to the attacker. (CVE-2012-1586)\n\nNote: mount.cifs from the cifs-utils package distributed by Scientific Linux does not have the setuid bit set. We recommend that administrators do not manually set the setuid bit for mount.cifs.\n\nThis update also fixes the following bugs :\n\n - The cifs.mount(8) manual page was previously missing documentation for several mount options. With this update, the missing entries have been added to the manual page.\n\n - Previously, the mount.cifs utility did not properly update the '/etc/mtab' system information file when remounting an existing CIFS mount. Consequently, mount.cifs created a duplicate entry of the existing mount entry. This update adds the del_mtab() function to cifs.mount, which ensures that the old mount entry is removed from '/etc/mtab' before adding the updated mount entry.\n\n - The mount.cifs utility did not properly convert user and group names to numeric UIDs and GIDs. Therefore, when the 'uid', 'gid' or 'cruid' mount options were specified with user or group names, CIFS shares were mounted with default values. This caused shares to be inaccessible to the intended users because UID and GID is set to '0' by default. With this update, user and group names are properly converted so that CIFS shares are now mounted with specified user and group ownership as expected.\n\n - The cifs.upcall utility did not respect the 'domain_realm' section in the 'krb5.conf' file and worked only with the default domain. Consequently, an attempt to mount a CIFS share from a different than the default domain failed with the following error message :\n\n mount error(126): Required key not available\n\nThis update modifies the underlying code so that cifs.upcall handles multiple Kerberos domains correctly and CIFS shares can now be mounted as expected in a multi-domain environment.\n\nIn addition, this update adds the following enhancements :\n\n - The cifs.upcall utility previously always used the '/etc/krb5.conf' file regardless of whether the user had specified a custom Kerberos configuration file. This update adds the '--krb5conf' option to cifs.upcall allowing the administrator to specify an alternate krb5.conf file. For more information on this option, refer to the cifs.upcall(8) manual page.\n\n - The cifs.upcall utility did not optimally determine the correct service principal name (SPN) used for Kerberos authentication, which occasionally caused krb5 authentication to fail when mounting a server's unqualified domain name. This update improves cifs.upcall so that the method used to determine the SPN is now more versatile.\n\n - This update adds the 'backupuid' and 'backupgid' mount options to the mount.cifs utility. When specified, these options grant a user or a group the right to access files with the backup intent. For more information on these options, refer to the mount.cifs(8) manual page.\n\nAll users of cifs-utils are advised to upgrade to this updated package, which contains backported patches to fix these issues and add these enhancements.", "published": "2012-08-01T00:00:00", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=61338", "cvelist": ["CVE-2012-1586"], "lastseen": "2017-10-29T13:43:06"}, {"id": "MANDRIVA_MDVSA-2012-070.NASL", "type": "nessus", "title": "Mandriva Linux Security Advisory : samba (MDVSA-2012:070)", "description": "A vulnerability has been found and corrected in samba :\n\nA file existence dislosure flaw was found in the way mount.cifs tool of the Samba SMB/CIFS tools suite performed mount of a Linux CIFS (Common Internet File System) filesystem. A local user, able to mount a remote CIFS share / target to a local directory could use this flaw to confirm (non) existence of a file system object (file, directory or process descriptor) via error messages generated during the mount.cifs tool run (CVE-2012-1586).\n\nThe updated packages have been patched to correct this issue.", "published": "2012-05-07T00:00:00", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=59012", "cvelist": ["CVE-2012-1586"], "lastseen": "2017-10-29T13:38:17"}, {"id": "FEDORA_2012-6257.NASL", "type": "nessus", "title": "Fedora 17 : cifs-utils-5.4-1.fc17 (2012-6257)", "description": "This updates the cifs-utils package to version 5.4, which contains a number of bugfixes and enhancements. Highlights include :\n\n - mount.cifs now supports the -s option by passing 'sloppy' to the kernel in the options string\n\n - cifs.upcall now properly respects the domain_realm section in krb5.conf\n\n - unprivileged users can no longer mount onto dirs into which they can't chdir (fixes CVE-2012-1586)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "published": "2012-05-02T00:00:00", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=58958", "cvelist": ["CVE-2012-1586"], "lastseen": "2017-10-29T13:39:27"}, {"id": "FEDORA_2012-6375.NASL", "type": "nessus", "title": "Fedora 16 : cifs-utils-5.4-1.fc16 (2012-6375)", "description": "This updates the cifs-utils package to version 5.4, which contains a number of bugfixes and enhancements. Highlights include :\n\n - mount.cifs now supports the -s option by passing 'sloppy' to the kernel in the options string\n\n - cifs.upcall now properly respects the domain_realm section in krb5.conf\n\n - unprivileged users can no longer mount onto dirs into which they can't chdir (fixes CVE-2012-1586)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "published": "2012-05-01T00:00:00", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=58930", "cvelist": ["CVE-2012-1586"], "lastseen": "2017-10-29T13:44:09"}, {"id": "MANDRIVA_MDVSA-2012-069.NASL", "type": "nessus", "title": "Mandriva Linux Security Advisory : cifs-utils (MDVSA-2012:069)", "description": "A vulnerability has been found and corrected in cifs-utils :\n\nA file existence dislosure flaw was found in the way mount.cifs tool of the Samba SMB/CIFS tools suite performed mount of a Linux CIFS (Common Internet File System) filesystem. A local user, able to mount a remote CIFS share / target to a local directory could use this flaw to confirm (non) existence of a file system object (file, directory or process descriptor) via error messages generated during the mount.cifs tool run (CVE-2012-1586).\n\nThe updated packages have been patched to correct this issue.", "published": "2012-05-07T00:00:00", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=59011", "cvelist": ["CVE-2012-1586"], "lastseen": "2017-10-29T13:33:46"}, {"id": "OPENSUSE-2012-268.NASL", "type": "nessus", "title": "openSUSE Security Update : cifs-utils (openSUSE-SU-2012:0607-1)", "description": "mount.cifs could leak information about existence of files normally not accessible to users", "published": "2014-06-13T00:00:00", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=74619", "cvelist": ["CVE-2012-1586"], "lastseen": "2017-10-29T13:39:33"}, {"id": "FEDORA_2012-6398.NASL", "type": "nessus", "title": "Fedora 15 : cifs-utils-5.4-1.fc15 (2012-6398)", "description": "This updates the cifs-utils package to version 5.4, which contains a number of bugfixes and enhancements. Highlights include :\n\n - mount.cifs now supports the -s option by passing 'sloppy' to the kernel in the options string\n\n - cifs.upcall now properly respects the domain_realm section in krb5.conf\n\n - unprivileged users can no longer mount onto dirs into which they can't chdir (fixes CVE-2012-1586)\n\n - the cifscreds, getcifsacl and setcifsacl programs have been added to the package\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "published": "2012-05-01T00:00:00", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=58932", "cvelist": ["CVE-2012-1586"], "lastseen": "2017-10-29T13:42:14"}], "openvas": [{"id": "OPENVAS:53402", "type": "openvas", "title": "Debian Security Advisory DSA 140-1 (libpng2, libpng3)", "description": "The remote host is missing an update to libpng2, libpng3\nannounced via advisory DSA 140-1.", "published": "2008-01-17T00:00:00", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=53402", "cvelist": ["CVE-2012-1586"], "lastseen": "2017-07-24T12:49:53"}, {"id": "OPENVAS:831667", "type": "openvas", "title": "Mandriva Update for samba MDVSA-2012:070 (samba)", "description": "Check for the Version of samba", "published": "2012-08-03T00:00:00", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=831667", "cvelist": ["CVE-2012-1586"], "lastseen": "2018-01-08T12:57:55"}, {"id": "OPENVAS:1361412562310870774", "type": "openvas", "title": "RedHat Update for cifs-utils RHSA-2012:0902-04", "description": "Check for the Version of cifs-utils", "published": "2012-06-22T00:00:00", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310870774", "cvelist": ["CVE-2012-1586"], "lastseen": "2018-02-05T11:08:23"}, {"id": "OPENVAS:864211", "type": "openvas", "title": "Fedora Update for cifs-utils FEDORA-2012-6398", "description": "Check for the Version of cifs-utils", "published": "2012-05-04T00:00:00", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=864211", "cvelist": ["CVE-2012-1586"], "lastseen": "2018-01-06T13:07:15"}, {"id": "OPENVAS:864206", "type": "openvas", "title": "Fedora Update for cifs-utils FEDORA-2012-6375", "description": "Check for the Version of cifs-utils", "published": "2012-05-04T00:00:00", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=864206", "cvelist": ["CVE-2012-1586"], "lastseen": "2018-01-02T10:57:29"}, {"id": "OPENVAS:870774", "type": "openvas", "title": "RedHat Update for cifs-utils RHSA-2012:0902-04", "description": "Check for the Version of cifs-utils", "published": "2012-06-22T00:00:00", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=870774", "cvelist": ["CVE-2012-1586"], "lastseen": "2018-01-02T10:56:51"}, {"id": "OPENVAS:1361412562310123887", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2012-0902", "description": "Oracle Linux Local Security Checks ELSA-2012-0902", "published": "2015-10-06T00:00:00", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310123887", "cvelist": ["CVE-2012-1586"], "lastseen": "2017-07-24T12:53:18"}, {"id": "OPENVAS:831567", "type": "openvas", "title": "Mandriva Update for cifs-utils MDVSA-2012:069 (cifs-utils)", "description": "Check for the Version of cifs-utils", "published": "2012-08-03T00:00:00", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=831567", "cvelist": ["CVE-2012-1586"], "lastseen": "2018-01-18T11:07:26"}, {"id": "OPENVAS:881178", "type": "openvas", "title": "CentOS Update for cifs-utils CESA-2012:0902 centos6 ", "description": "Check for the Version of cifs-utils", "published": "2012-07-30T00:00:00", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=881178", "cvelist": ["CVE-2012-1586"], "lastseen": "2018-01-06T13:07:25"}], "oraclelinux": [{"id": "ELSA-2012-0902", "type": "oraclelinux", "title": "cifs-utils security, bug fix, and enhancement update", "description": "[4.8.1-10]\n- mount.cifs: don't allow unprivileged users to mount onto dirs they can't chdir into (bz 812782)\n[4.8.1-9]\n- cifs.upcall: use krb5_sname_to_principal to construct principal name (bz 805490)\n[4.8.1-8]\n- mount.cifs: add backupuid=/backupgid= mount options (bz 806337)\n[4.8.1-7]\n- RFE: Improve selection of SPNs with cifs.upcall (bz 748757)\n- mount.cifs does not use KRB5_CONFIG (bz 748756)\n[creates additional entries in /etc/mtab (bz 770004)]\n- mount.cifs does not honor the uid/gid=username option, only the uid/gid=# option (bz 796463)\n[4.8.1-6]\n- undocumented mount.cifs options (bz 769923)", "published": "2012-06-27T00:00:00", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "href": "http://linux.oracle.com/errata/ELSA-2012-0902.html", "cvelist": ["CVE-2012-1586"], "lastseen": "2016-09-04T11:16:21"}], "redhat": [{"id": "RHSA-2012:0902", "type": "redhat", "title": "(RHSA-2012:0902) Low: cifs-utils security, bug fix, and enhancement update", "description": "The cifs-utils package contains tools for mounting and managing shares on\nLinux using the SMB/CIFS protocol. The CIFS shares can be used as standard\nLinux file systems.\n\nA file existence disclosure flaw was found in mount.cifs. If the tool was\ninstalled with the setuid bit set, a local attacker could use this flaw to\ndetermine the existence of files or directories in directories not\naccessible to the attacker. (CVE-2012-1586)\n\nNote: mount.cifs from the cifs-utils package distributed by Red Hat does\nnot have the setuid bit set. We recommend that administrators do not\nmanually set the setuid bit for mount.cifs.\n\nThis update also fixes the following bugs:\n\n* The cifs.mount(8) manual page was previously missing documentation for\nseveral mount options. With this update, the missing entries have been\nadded to the manual page. (BZ#769923)\n\n* Previously, the mount.cifs utility did not properly update the\n\"/etc/mtab\" system information file when remounting an existing CIFS\nmount. Consequently, mount.cifs created a duplicate entry of the existing\nmount entry. This update adds the del_mtab() function to cifs.mount, which\nensures that the old mount entry is removed from \"/etc/mtab\" before adding\nthe updated mount entry. (BZ#770004)\n\n* The mount.cifs utility did not properly convert user and group names to\nnumeric UIDs and GIDs. Therefore, when the \"uid\", \"gid\" or \"cruid\" mount\noptions were specified with user or group names, CIFS shares were mounted\nwith default values. This caused shares to be inaccessible to the intended\nusers because UID and GID is set to \"0\" by default. With this update, user\nand group names are properly converted so that CIFS shares are now mounted\nwith specified user and group ownership as expected. (BZ#796463)\n\n* The cifs.upcall utility did not respect the \"domain_realm\" section in\nthe \"krb5.conf\" file and worked only with the default domain.\nConsequently, an attempt to mount a CIFS share from a different than the\ndefault domain failed with the following error message:\n\n mount error(126): Required key not available\n\nThis update modifies the underlying code so that cifs.upcall handles\nmultiple Kerberos domains correctly and CIFS shares can now be mounted as\nexpected in a multi-domain environment. (BZ#805490)\n\nIn addition, this update adds the following enhancements:\n\n* The cifs.upcall utility previously always used the \"/etc/krb5.conf\" file\nregardless of whether the user had specified a custom Kerberos\nconfiguration file. This update adds the \"--krb5conf\" option to\ncifs.upcall allowing the administrator to specify an alternate\nkrb5.conf file. For more information on this option, refer to the\ncifs.upcall(8) manual page. (BZ#748756)\n\n* The cifs.upcall utility did not optimally determine the correct service\nprincipal name (SPN) used for Kerberos authentication, which occasionally\ncaused krb5 authentication to fail when mounting a server's unqualified\ndomain name. This update improves cifs.upcall so that the method used to\ndetermine the SPN is now more versatile. (BZ#748757)\n\n* This update adds the \"backupuid\" and \"backupgid\" mount options to the\nmount.cifs utility. When specified, these options grant a user or a group\nthe right to access files with the backup intent. For more information on\nthese options, refer to the mount.cifs(8) manual page. (BZ#806337)\n\nAll users of cifs-utils are advised to upgrade to this updated package,\nwhich contains backported patches to fix these issues and add these\nenhancements.\n", "published": "2012-06-20T04:00:00", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "href": "https://access.redhat.com/errata/RHSA-2012:0902", "cvelist": ["CVE-2012-1586"], "lastseen": "2017-12-25T20:05:03"}], "centos": [{"id": "CESA-2012:0902", "type": "centos", "title": "cifs security update", "description": "**CentOS Errata and Security Advisory** CESA-2012:0902\n\n\nThe cifs-utils package contains tools for mounting and managing shares on\nLinux using the SMB/CIFS protocol. The CIFS shares can be used as standard\nLinux file systems.\n\nA file existence disclosure flaw was found in mount.cifs. If the tool was\ninstalled with the setuid bit set, a local attacker could use this flaw to\ndetermine the existence of files or directories in directories not\naccessible to the attacker. (CVE-2012-1586)\n\nNote: mount.cifs from the cifs-utils package distributed by Red Hat does\nnot have the setuid bit set. We recommend that administrators do not\nmanually set the setuid bit for mount.cifs.\n\nThis update also fixes the following bugs:\n\n* The cifs.mount(8) manual page was previously missing documentation for\nseveral mount options. With this update, the missing entries have been\nadded to the manual page. (BZ#769923)\n\n* Previously, the mount.cifs utility did not properly update the\n\"/etc/mtab\" system information file when remounting an existing CIFS\nmount. Consequently, mount.cifs created a duplicate entry of the existing\nmount entry. This update adds the del_mtab() function to cifs.mount, which\nensures that the old mount entry is removed from \"/etc/mtab\" before adding\nthe updated mount entry. (BZ#770004)\n\n* The mount.cifs utility did not properly convert user and group names to\nnumeric UIDs and GIDs. Therefore, when the \"uid\", \"gid\" or \"cruid\" mount\noptions were specified with user or group names, CIFS shares were mounted\nwith default values. This caused shares to be inaccessible to the intended\nusers because UID and GID is set to \"0\" by default. With this update, user\nand group names are properly converted so that CIFS shares are now mounted\nwith specified user and group ownership as expected. (BZ#796463)\n\n* The cifs.upcall utility did not respect the \"domain_realm\" section in\nthe \"krb5.conf\" file and worked only with the default domain.\nConsequently, an attempt to mount a CIFS share from a different than the\ndefault domain failed with the following error message:\n\n mount error(126): Required key not available\n\nThis update modifies the underlying code so that cifs.upcall handles\nmultiple Kerberos domains correctly and CIFS shares can now be mounted as\nexpected in a multi-domain environment. (BZ#805490)\n\nIn addition, this update adds the following enhancements:\n\n* The cifs.upcall utility previously always used the \"/etc/krb5.conf\" file\nregardless of whether the user had specified a custom Kerberos\nconfiguration file. This update adds the \"--krb5conf\" option to\ncifs.upcall allowing the administrator to specify an alternate\nkrb5.conf file. For more information on this option, refer to the\ncifs.upcall(8) manual page. (BZ#748756)\n\n* The cifs.upcall utility did not optimally determine the correct service\nprincipal name (SPN) used for Kerberos authentication, which occasionally\ncaused krb5 authentication to fail when mounting a server's unqualified\ndomain name. This update improves cifs.upcall so that the method used to\ndetermine the SPN is now more versatile. (BZ#748757)\n\n* This update adds the \"backupuid\" and \"backupgid\" mount options to the\nmount.cifs utility. When specified, these options grant a user or a group\nthe right to access files with the backup intent. For more information on\nthese options, refer to the mount.cifs(8) manual page. (BZ#806337)\n\nAll users of cifs-utils are advised to upgrade to this updated package,\nwhich contains backported patches to fix these issues and add these\nenhancements.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2012-July/018721.html\n\n**Affected packages:**\ncifs-utils\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2012-0902.html", "published": "2012-07-10T13:26:17", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "href": "http://lists.centos.org/pipermail/centos-announce/2012-July/018721.html", "cvelist": ["CVE-2012-1586"], "lastseen": "2017-10-03T18:25:54"}], "exploitdb": [{"id": "EDB-ID:18783", "type": "exploitdb", "title": "mount.cifs chdir Arbitrary Root File Identification", "description": "mount.cifs chdir() Arbitrary Root File Identification. CVE-2012-1586. Local exploit for linux platform", "published": "2012-04-25T00:00:00", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "href": "https://www.exploit-db.com/exploits/18783/", "cvelist": ["CVE-2012-1586"], "lastseen": "2016-02-02T10:26:47"}], "suse": [{"id": "SUSE-SU-2012:0575-1", "type": "suse", "title": "Security update for Samba (important)", "description": "This update of Samba includes the following fixes for two\n security issues:\n\n * Ensure that users cannot hand out their own\n privileges to everyone, only administrators are allowed to\n do that. (CVE-2012-2111\n &lt;<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2111\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2111</a>\n &gt; )\n * mount.cifs no longer allows unprivileged users to\n mount onto dirs that are not accessible to them.\n (CVE-2012-1568\n &lt;<a rel=\"nofollow\" href=\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1586\">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1586</a>\n &gt; )\n", "published": "2012-05-01T01:08:20", "cvss": {"score": 6.5, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00024.html", "cvelist": ["CVE-2012-2111", "CVE-2012-1568", "CVE-2012-1586"], "lastseen": "2016-09-04T11:54:52"}, {"id": "SUSE-SU-2013:0325-1", "type": "suse", "title": "Security update for Samba (important)", "description": "The Samba Web Administration Tool (SWAT) in Samba versions\n 3.0.x to 4.0.1 was affected by a cross-site request\n forgery (CVE-2013-0214) and a click-jacking attack\n (CVE-2013-0213). This has been fixed.\n\n Additionally a bug in mount.cifs has been fixed which could\n have lead to file disclosure (CVE-2012-1586).\n\n Also a uninitialized memory read bug in talloc_free() has\n been fixed. (bnc#764577).\n", "published": "2013-02-22T16:04:20", "cvss": {"score": 5.1, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00018.html", "cvelist": ["CVE-2013-0214", "CVE-2013-0213", "CVE-2012-1586"], "lastseen": "2016-09-04T11:51:43"}]}}